2017
DOI: 10.1016/j.vehcom.2016.11.010
|View full text |Cite
|
Sign up to set email alerts
|

TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs

Abstract: A trust establishment scheme for enhancing inter-vehicular communication and preventing DoS attacks 'TFDD' is proposed in this paper. Based on a developed intrusion detection module (IDM) and data centric verification, our framework allows preventing DDoS attacks and eliminating misbehaving nodes in a distributed, collaborative and instantaneous manner. In addition, a trusted routing protocol is proposed that, using context-based information such as link stability and trust information, delivers data through t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 55 publications
(42 citation statements)
references
References 38 publications
0
42
0
Order By: Relevance
“…In the proposed algorithm, the algorithm TFDD is used to defend against DOS. The distinguishing characteristics of this method is using trust‐based system and not using coding methods.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the proposed algorithm, the algorithm TFDD is used to defend against DOS. The distinguishing characteristics of this method is using trust‐based system and not using coding methods.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Formula 16 is based on the algorithms used in the simulation. In the proposed algorithm, the TFDD algorithm was used to deal with the DOS attack. The obvious feature of this approach is to use a trust‐based system and not to use cryptographic methods.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…9,10 (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages. [11][12][13] (4) Pseudonym expiry is also another problem of the current trust management systems. 15,16,18,19,21,43 If RS make a decision immediately, they might lose important messages that would have helped them to make a better decision; moreover, if RS delay decision making, they might receive some incorrect event messages.…”
Section: Discussionmentioning
confidence: 99%
“…The same trick used to support bogus event message can still work . (3) Various attacks, if malicious vehicles link ability to normal vehicle, cheat the message receiver by altering the trust management of the event message; a vehicle will be misled due to too many malicious vehicles forwarding the event message to maintain bogus messages and against the normal messages . (4) Pseudonym expiry is also another problem of the current trust management systems .…”
Section: Introductionmentioning
confidence: 99%
“…Hasrouny et al [88] propose to calculate trust values of the vehicles that can limit the number of accepted received messages from neighbors -if a certain threshold is exceeded (which will be the case in DoS attack), a report is sent to the trusted entity, say misbehavior authority (MA) [34], to deactivate the attacker. The TFDD framework [89] can detect DoS and DDoS attacks in a distributed manner by trust establishment between vehicles. Each vehicle maintains local and global parameters (e.g., neighbor id, various message counters, trust score) in order to include/exclude neighbours from a local or global black-list.…”
Section: A Dos Detection/mitigationmentioning
confidence: 99%